First published: Wed Jan 21 2015(Updated: )
Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Oracle JDK 6 | =1.5.0-update75 | |
Oracle JDK 6 | =1.6.0-update85 | |
Oracle JDK 6 | =1.7.0-update71 | |
Oracle JDK 6 | =1.7.0-update72 | |
Oracle JDK 6 | =1.8.0-update25 | |
Oracle JDK 6 | =1.8.0-update6 | |
Oracle Java Runtime Environment (JRE) | =1.5.0-update75 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update85 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update71 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update72 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update25 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update6 | |
BEA JRockit | =r27.8.4 | |
BEA JRockit | =r28.3.4 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
SUSE Linux Enterprise Desktop | =11.0-sp3 | |
SUSE Linux Enterprise Server | =12.0 | |
openSUSE | =13.2 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0410 has been categorized with a high severity due to its impact on software availability.
To mitigate CVE-2015-0410, you should update to the latest version of Java SE or JRockit that addresses this vulnerability.
CVE-2015-0410 affects Oracle Java SE 5.0u75 to 8u25, Java SE Embedded 7u71 and 8u6, and specific versions of JRockit.
There are no recommended workarounds for CVE-2015-0410; applying the appropriate updates is the best course of action.
Yes, CVE-2015-0410 can be exploited by remote attackers, which poses a risk to affected systems.